F5 Air Force TechTalk
SSL Break and Inspect Join F5 Networks and Carahsoft to earn (ISC)2 CPE credits and discuss how to create an SSL/TLS strategy for Application Cybersecurity protection in the Datacenter. Learn which SSL/TLS standards are necessary to meet the new DoD requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS designs to mit...
Security and Efficiency with Time Matters
In the legal world, security remains one of the top priorities faced today. We are often challenged with protecting client information, department information, and even classified government documentation. With tightening budgets, how is it possible to maintain the growing workload and demands without trustworthy software and automation? View our complimentary on-demand webcast during which we will discuss how LexisNexis Time Matters allows le...
Detect Advanced Threats with Behavioral...
Behavioral analytics is a new approach to threat detection that uses advanced machine learning and probabilistic math to identify the anomalous actions unique to both outsider and insider attempts to steal sensitive data. Early deployments in the field show this method to be highly effective.View our on-demand webcast to hear data scientist Stephan Jou, CTO of Interset, discuss how behavioral analytics is a game changer when it comes to detect...
The Benefits and Implementation of BIM...
Join Autodesk Carahsoft, and CADD Micro, as we discuss why the time is now for owners to start to understand the business issues of the people who use facility data, and address their data and workflow needs. The loss of information through the life of a building comes at a significant cost. Build a strong foundation for Building, Installation and Facilities Management with accurate and available data on your buildings and facilities assets. G...
A New Approach to Application Management
Do you want to resolve application problems faster, gain end-to-end visibility across all components of your application environment, and get unprecedented insights from your application data? We at Splunk know that achieving these goals is often challenged by the complexity of today’s mission critical application environments - multi-layered, virtualized, distributed in the cloud, and siloed—pushing established monitoring methods...
BIM and REM: A Powerful Combination for...
BIM and REM: A Powerful Combination for Federal Facilities Gain insight on how to direct limited resources in order to meet energy and carbon reduction mandates with Autodesk technology for building, installation, and facilities management. Join Autodesk, Carahsoft, and CADD Microsystems on August 13th to learn how Building Information Modeling (BIM) and Rapid Energy Modeling (REM) solutions from Autodesk can provide visibility into a building...
2015 Gangs Across the Carolinas
The Gang Free North Carolina Academy is geared towards those professionals, who are not sworn law enforcement, who work with gangs and gang members. This may include, but is not limited to, teachers, social workers, principals, parents, hospital personnel, court counselors, GAL, volunteers, mental health administrators and anyone who works with juveniles. Gangs are not new to North Carolina, neither are prevention, intervention and suppression...
Adobe TXDIR Webinar Creative Collaborat...
Give your agency's creative teams the industry-leading apps they want, and get the secure, customizable deployments your IT team requires. With the 2015 release of Creative Cloud, all the apps and assets you need are right at your fingertips, across desktop and mobile devices. The 2015 Creative Cloud offers new creative tools, performance boosts, and touch workflows to help you work more efficiently. View our complimentary on-demand webinar to...
It's Time for Active Risk Manager
Boost Your Organization's Performance and Growth Today’s project-focused organizations are more complex than ever before, as business complexity increases so does exposure to risk. An effective Enterprise Risk Management (ERM) solution can transform your organization and empower users to tackle risk potential directly – proactively identifying, understanding, and managing risk for sustainable, long-term growth. Join us for a compli...
How Do You Scale a Backup and Recovery...
Software defined data centers promise agility, scalability, security and portability for enterprise workloads. You may already be asking how to start your journey to SDDC. Or you may be evaluating the possibility of creating an SDDC to deliver services to your end users. Data protection and disaster recovery strategy is in your mind when the risk landscape is changing. Join Veritas and Carahsoft to see how the NEW NetBackup 7.7 can provide end...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.